Found: 81
Select item for more details and to access through your institution.
EDFIDepth: enriched multi-path vision transformer feature interaction networks for monocular depth estimation.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 14, p. 21023, doi. 10.1007/s11227-024-06205-7
- By:
- Publication type:
- Article
MWformer: a novel low computational cost image restoration algorithm.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 14, p. 21508, doi. 10.1007/s11227-024-06160-3
- By:
- Publication type:
- Article
Boundary enhancement and refinement network for camouflaged object detection.
- Published in:
- Machine Vision & Applications, 2024, v. 35, n. 5, p. 1, doi. 10.1007/s00138-024-01588-2
- By:
- Publication type:
- Article
Retraction Note: Detecting straggler MapReduce tasks in big data processing infrastructure by neural network.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
PCDR-DFF: multi-modal 3D object detection based on point cloud diversity representation and dual feature fusion.
- Published in:
- Neural Computing & Applications, 2024, v. 36, n. 16, p. 9329, doi. 10.1007/s00521-024-09561-w
- By:
- Publication type:
- Article
Joint entity and relation extraction model based on directed-relation GAT oriented to Chinese patent texts.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2024, v. 28, n. 11/12, p. 7557, doi. 10.1007/s00500-024-09629-8
- By:
- Publication type:
- Article
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 8, p. 10444, doi. 10.1007/s11227-023-05833-9
- By:
- Publication type:
- Article
DSTGCS: an intelligent dynamic spatial–temporal graph convolutional system for traffic flow prediction in ITS.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2024, v. 28, n. 9/10, p. 6909, doi. 10.1007/s00500-023-09553-3
- By:
- Publication type:
- Article
Does Short-and-Distort Scheme Really Exist? A Bitcoin Futures Audit Scheme through BIRCH & BPNN Approach.
- Published in:
- Computational Economics, 2024, v. 63, n. 4, p. 1649, doi. 10.1007/s10614-023-10378-3
- By:
- Publication type:
- Article
MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 2487, doi. 10.1007/s11227-023-05561-0
- By:
- Publication type:
- Article
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 1, p. 202, doi. 10.1007/s11227-023-05438-2
- By:
- Publication type:
- Article
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
Multi-head attention-based model for reconstructing continuous missing time series data.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 18, p. 20684, doi. 10.1007/s11227-023-05465-z
- By:
- Publication type:
- Article
Performance of representation fusion model for entity and relationship extraction within unstructured text.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 18, p. 20826, doi. 10.1007/s11227-023-05442-6
- By:
- Publication type:
- Article
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT.
- Published in:
- Telecommunication Systems, 2023, v. 84, n. 4, p. 549, doi. 10.1007/s11235-023-01059-5
- By:
- Publication type:
- Article
An evolutive framework for server placement optimization to digital twin networks.
- Published in:
- International Journal of Communication Systems, 2023, v. 36, n. 14, p. 1, doi. 10.1002/dac.5553
- By:
- Publication type:
- Article
Research on global register allocation for code containing array‐unit dual‐usage register names.
- Published in:
- Concurrency & Computation: Practice & Experience, 2023, v. 35, n. 19, p. 1, doi. 10.1002/cpe.7519
- By:
- Publication type:
- Article
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2023, v. 27, n. 16, p. 11647, doi. 10.1007/s00500-023-08220-x
- By:
- Publication type:
- Article
A shared libraries aware and bank partitioning-based mechanism for multicore architecture.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2023, v. 27, n. 13, p. 8775, doi. 10.1007/s00500-023-08020-3
- By:
- Publication type:
- Article
Fairness constraint efficiency optimization for multiresource allocation in a cluster system serving internet of things.
- Published in:
- International Journal of Communication Systems, 2023, v. 36, n. 3, p. 1, doi. 10.1002/dac.5395
- By:
- Publication type:
- Article
A novel oversampling and feature selection hybrid algorithm for imbalanced data classification.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 3, p. 3231, doi. 10.1007/s11042-022-13240-0
- By:
- Publication type:
- Article
A blockchain-based secure storage and access control scheme for supply chain finance.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 1, p. 109, doi. 10.1007/s11227-022-04655-5
- By:
- Publication type:
- Article
A localization algorithm for DV-Hop wireless sensor networks based on manhattan distance.
- Published in:
- Telecommunication Systems, 2022, v. 81, n. 2, p. 207, doi. 10.1007/s11235-022-00943-w
- By:
- Publication type:
- Article
An Evolutionary-Based Approach for Low-Complexity Intrusion Detection in Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2022, v. 126, n. 3, p. 2019, doi. 10.1007/s11277-021-08757-w
- By:
- Publication type:
- Article
A novel secure DV-Hop localization algorithm against wormhole attacks.
- Published in:
- Telecommunication Systems, 2022, v. 80, n. 3, p. 413, doi. 10.1007/s11235-022-00914-1
- By:
- Publication type:
- Article
Ensemble machine learning approaches for webshell detection in Internet of things environments.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2022, v. 33, n. 6, p. 1, doi. 10.1002/ett.4085
- By:
- Publication type:
- Article
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2022, v. 26, n. 9, p. 4423, doi. 10.1007/s00500-021-06496-5
- By:
- Publication type:
- Article
Isaacs' syndrome as the initial presentation of malignant thymoma and associated with double-positive voltage-gated potassium channel complex antibodies, a case report.
- Published in:
- 2022
- By:
- Publication type:
- Case Study
Verifiable data streaming with efficient update for intelligent automation systems.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 2, p. 1322, doi. 10.1002/int.22671
- By:
- Publication type:
- Article
Improving the Efficiency of Customer's Credit Rating with Machine Learning in Big Data Cloud Computing.
- Published in:
- Wireless Personal Communications, 2021, v. 121, n. 4, p. 2699, doi. 10.1007/s11277-021-08844-y
- By:
- Publication type:
- Article
A multi‐objective distance vector‐hop localization algorithm based on differential evolution quantum particle swarm optimization.
- Published in:
- International Journal of Communication Systems, 2021, v. 34, n. 14, p. 1, doi. 10.1002/dac.4924
- By:
- Publication type:
- Article
A two-stage intrusion detection approach for software-defined IoT networks.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 16, p. 10935, doi. 10.1007/s00500-021-05809-y
- By:
- Publication type:
- Article
K maximum probability attack paths generation algorithm for target nodes in networked systems.
- Published in:
- International Journal of Information Security, 2021, v. 20, n. 4, p. 535, doi. 10.1007/s10207-020-00517-4
- By:
- Publication type:
- Article
A clique-based discrete bat algorithm for influence maximization in identifying top-k influential nodes of social networks.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 13, p. 8223, doi. 10.1007/s00500-021-05749-7
- By:
- Publication type:
- Article
An energy-efficient task migration scheme based on genetic algorithms for mobile applications in CloneCloud.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 5, p. 5220, doi. 10.1007/s11227-020-03470-0
- By:
- Publication type:
- Article
Cross-modality co-attention networks for visual question answering.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 7, p. 5411, doi. 10.1007/s00500-020-05539-7
- By:
- Publication type:
- Article
Sentiment classification model for Chinese micro-blog comments based on key sentences extraction.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 1, p. 463, doi. 10.1007/s00500-020-05160-8
- By:
- Publication type:
- Article
On the Exploitation of Blockchain for Distributed File Storage.
- Published in:
- Journal of Sensors, 2020, p. 1, doi. 10.1155/2020/8861688
- By:
- Publication type:
- Article
On the Exploitation of Blockchain for Distributed File Storage.
- Published in:
- Journal of Sensors, 2020, p. 1, doi. 10.1155/2020/8861688
- By:
- Publication type:
- Article
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 20, p. 5735, doi. 10.3390/s20205735
- By:
- Publication type:
- Article
Detecting straggler MapReduce tasks in big data processing infrastructure by neural network.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 9, p. 6969, doi. 10.1007/s11227-019-03136-6
- By:
- Publication type:
- Article
Wireless sensor network intrusion detection system based on MK-ELM.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 16, p. 12361, doi. 10.1007/s00500-020-04678-1
- By:
- Publication type:
- Article
Recognition of Crop Diseases Based on Depthwise Separable Convolution in Edge Computing.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 15, p. 4091, doi. 10.3390/s20154091
- By:
- Publication type:
- Article
DroidPortrait: Android Malware Portrait Construction Based on Multidimensional Behavior Analysis.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 11, p. 3978, doi. 10.3390/app10113978
- By:
- Publication type:
- Article
Optimal Execution Strategy for Large Orders in Big Data: Order Type using Q-learning Considerations.
- Published in:
- Wireless Personal Communications, 2020, v. 112, n. 1, p. 123, doi. 10.1007/s11277-019-07019-0
- By:
- Publication type:
- Article
On one-time cookies protocol based on one-time password.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 8, p. 5657, doi. 10.1007/s00500-019-04138-5
- By:
- Publication type:
- Article
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.
- Published in:
- Computational & Mathematical Methods in Medicine, 2020, p. 1, doi. 10.1155/2020/3658795
- By:
- Publication type:
- Article
An energy-efficient dynamic decision model for wireless multi-sensor network.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 3, p. 1585, doi. 10.1007/s11227-018-2419-1
- By:
- Publication type:
- Article
SNPL: One Scheme of Securing Nodes in IoT Perception Layer.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 4, p. 1090, doi. 10.3390/s20041090
- By:
- Publication type:
- Article
Blockchain‐based fair three‐party contract signing protocol for fog computing.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 22, p. N.PAG, doi. 10.1002/cpe.4469
- By:
- Publication type:
- Article